Automating Windows endpoint hardening with Wazuh 

Automating Windows endpoint hardening with Wazuh 

Post icon
/ Engineering
By

Endpoint hardening is a continuous process for securing modern IT environments against vulnerabilities and misconfigurations. It reduces the attack surface of endpoints and strengthens defenses against cyber threats by enforcing standardized security configurations. Organizations typically rely on established guidelines such as the Center for Internet Security (CIS) Benchmarks and frameworks like NIST, which provide best […]

Read more
Monitoring access control violations with Open Policy Agent (OPA) and Wazuh

Monitoring access control violations with Open Policy Agent (OPA) and Wazuh

Post icon
/ Engineering
By

Access control protects the confidentiality, integrity, and availability of systems and data. It is important because attackers frequently exploit legitimate accounts, excessive permissions, and weak policy enforcement to blend into normal operations. While access control systems are designed to prevent unauthorized actions, the decisions they generate, such as denied requests, privilege escalations, or anomalous authorization […]

Read more
Incident management with Wazuh and Rootly

Incident management with Wazuh and Rootly

Post icon
/ Engineering
By

Incident management involves detecting, responding to, and resolving unplanned events efficiently across systems and teams. It is important for organizations aiming to reduce downtime, mitigate risks, and maintain operational resilience. Incident management platforms like Rootly are designed to streamline and automate response workflows for engineering, operations, and security teams. Integrating Rootly with Wazuh connects Wazuh […]

Read more
Detecting and responding to Rhadamanthys stealer with Wazuh

Detecting and responding to Rhadamanthys stealer with Wazuh

Post icon
/ Engineering
By

Rhadamanthys Stealer is a credential-harvesting malware sold as Malware-as-a-Service (MaaS). It is known for its modular architecture, data-stealing capabilities, and continuous updates driven by criminal marketplaces. Attackers distribute Rhadamanthys stealer via phishing emails, cracked software, malicious ads, and fake installers. The stealer primarily targets Windows endpoints to extract browser passwords, crypto wallets, system metadata, autofill […]

Read more
Open source software as the future of cybersecurity 

Open source software as the future of cybersecurity 

Post icon
/ Engineering
By

Open source software makes its source code publicly available, allowing anyone to inspect, audit, and improve it. This transparency creates verifiable trust, where security claims can be independently validated by a global community instead of taken on faith. Open source licenses give users full control to understand, customize, and extend the software to meet their […]

Read more
Detecting and responding to Cephalus ransomware with Wazuh

Detecting and responding to Cephalus ransomware with Wazuh

Post icon
/ Engineering
By

Cephalus ransomware surfaced in mid-August 2025 and quickly attracted attention for its stealth and operational precision. The threat actors demonstrate a clear financial motivation and rely on initial access vectors. They exploit weak or exposed Remote Desktop Protocol (RDP) configurations, particularly targeting accounts lacking Multi-Factor Authentication (MFA) protection, to gain unauthorized access. Cephalus ransomware targets […]

Read more
Detecting React CVE-2025-55182 RCE vulnerability with Wazuh

Detecting React CVE-2025-55182 RCE vulnerability with Wazuh

Post icon
/ Engineering
By

A critical severity Remote Code Execution (RCE) vulnerability disclosed as CVE-2025-55182, has been identified affecting the React Server Components (RSC) protocol. This vulnerability is rated CVSS 10.0 and allows unauthenticated attackers to execute arbitrary code on the server via insecure deserialization of malicious HTTP requests. The flaws also affect frameworks and bundlers that use the […]

Read more
Automated password rotation with Wazuh and Shuffle

Automated password rotation with Wazuh and Shuffle

Post icon
/ Engineering
By

Automated password rotation helps protect both cloud and on-premises environments from unauthorized access and credential compromise by reducing the risk associated with exposed credentials. Suspicious or unrecognized login attempts may indicate stolen credentials, compromised accounts, or malicious insider activity. By proactively managing credentials and monitoring authentication events, organizations reduce the risk of insider threats while […]

Read more
Detecting Next.js CVE-2025-66478 RCE vulnerability with Wazuh

Detecting Next.js CVE-2025-66478 RCE vulnerability with Wazuh

Post icon
/ Engineering
By

A critical severity Remote Code Execution (RCE) vulnerability affecting Next.js applications that use the App Router has been identified. This vulnerability is rated CVSS 10.0, disclosed as CVE-2025-66478 and allows remote code execution (RCE) when attacker-controlled requests are processed in unpatched environments. It stems from an upstream vulnerability in the React Server Components (RSC) protocol […]

Read more
Detecting Chrome CVE-2025-13223 vulnerability with Wazuh

Detecting Chrome CVE-2025-13223 vulnerability with Wazuh

Post icon
/ Engineering
By

Another zero-day vulnerability tracked as CVE-2025-13223 has been discovered to affect Google Chrome and Chromium web browsers on Windows, macOS, and Linux endpoints. It follows the earlier disclosure of CVE-2025-4664, which also affects these web browsers. This is a high-severity flaw with a CVSS score of 8.8 reported to be actively exploited in the wild.  […]

Read more
Detecting and responding to Funklocker ransomware with Wazuh

Detecting and responding to Funklocker ransomware with Wazuh

Post icon
/ Engineering
By

Funklocker ransomware is a recently observed threat attributed to the FunkSec group, primarily targeting Windows environments. It is known for using AI-assisted code generation to produce new variants, which makes traditional signature-based defenses less effective. Funklocker ransomware uses living-off-the-land (LOTL) techniques by blending malicious activity with legitimate system functions to evade detection. This includes running […]

Read more
Keep up to date
with our digest of articles